Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name CVE-2017-14454 First vendor Publication 2023-01-12
Vendor Cve Last vendor Modification 2023-01-20

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
Overall CVSS Score 8.5
Base Score 8.5 Environmental Score 8.5
impact SubScore 6 Temporal Score 8.5
Exploitabality Sub Score 1.8
 
Attack Vector Network Attack Complexity High
Privileges Required Low User Interaction None
Scope Changed Confidentiality Impact High
Integrity Impact High Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

Multiple exploitable buffer overflow vulnerabilities exists in the PubNub message handler for the "control" channel of Insteon Hub running firmware version 1012. Specially crafted replies received from the PubNub service can cause buffer overflows on a global section overwriting arbitrary data. An attacker should impersonate PubNub and answer an HTTPS GET request to trigger this vulnerability. The `strcpy` at [18] overflows the buffer `insteon_pubnub.channel_al`, which has a size of 16 bytes.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14454

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 1

Snort® IPS/IDS

Date Description
2017-12-05 TRUFFLEHUNTER TALOS-2017-0502 attack attempt
RuleID : 45088 - Revision : 1 - Type : SERVER-WEBAPP

Sources (Detail)

Source Url
MISC https://talosintelligence.com/vulnerability_reports/TALOS-2017-0502

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
Date Informations
2023-01-21 00:27:21
  • Multiple Updates
2023-01-13 02:14:13
  • Multiple Updates
2023-01-13 01:32:13
  • Multiple Updates
2023-01-12 17:27:14
  • Multiple Updates
2023-01-12 05:27:20
  • First insertion